Nazwa oprogramowania |
Strona domowa |
Pobierane |
THC-Vmap |
http://www.thc.org |
1775x |
Vmap stands for version mapper. It allows you to find out the version of a daemon by fingerprinting the features and replys of bogus commands. It's a great addition to the other *map tools.
|
|
trapdoor2 |
http://oss.linbit.com/trapdoor2/ |
1774x |
Trapdoor2 (td2) allows remote users to execute local commands by sending 'magic cookies'. this can e.g. be used to alter local firewalling rules so people can connect to local services after sending the magick cookie.
|
|
fcatalog |
http://fcatalog.lupine.org/ |
1774x |
fcatalog is a program for identifying the origins of files. Though its operation is similar to the operation of file-checksum-checking security utilities (like tripwire), its purpose and methodology is different.
|
|
PGP |
http://www.pgpi.org/ |
1773x |
Tool for secure datas - mainly e-mail communication. Basic version free.
|
|
GnuPG.pm |
http://indev.insu.com/GnuPG/ |
1773x |
The GnuPG perl module interfaces with the Gnu Privacy Guard using the coprocess hooks provided by gpg.
|
|
THC-SecureDelete |
http://www.thc.org/ |
1771x |
Tool for secure deleting files.
|
|
THC-Rut |
http://www.thc.org |
1770x |
THC-RUT (aRe yoU There, pronouced as root) is your first knife on foreign network. It gathers informations from local and remote networks. It offers a wide range of network discovery tools: arp lookup on an IP range, spoofed DHCP request, RARP, BOOTP, ICMP-ping, ICMP address mask request, OS fingerprintings, high-speed host discovery, ... The tool is capable of discovering a Class B network within 10 minutes.
|
|
THC-WarDrive |
http://www.thc.org |
1769x |
The major focus of THC is to investigate and analyze common security solutions and propose concepts for circumventing security mechanisms.
|
|
Strobe |
http://fr3dy.meanmachine.ch/strobe.html |
1769x |
Strobe is a fast TCP Port Scanner.
|
|
fe3d |
http://projects.icapsid.net/fe3d/ |
1768x |
fe3d is a 3D visualization tool for network (security) information. It has support for nmap and (limited) support for languard XML log files.
|
|
THC-UnixHackingTools |
http://www.thc.org |
1768x |
Unix rootkit.
|
|
DNS Flood Detector |
http://www.adotout.com/ |
1761x |
DNS Flood Detector jest przeznaczony do wykrywania nadużyć w korzystaniu z mocno obciążonych serwerów nazw i umożliwia szybką odpowiedź w postaci zatrzymania (oraz innych czynności) działania serwera nazw używanego do rozsyłania spamu.
|
|
Medusa DS9 |
http://medusa.terminus.sk/ |
1760x |
Medusa DS9 to narzędzie do zwiększania bezpieczeństwa Linuksa. Składa się z dwóch części - łatek na jądro Linux oraz demona trybu użytkownika.
|
|
LinVPN |
http://mrtg.planetmirror.com/pub/linvpn/ |
1759x |
LinVPN allows you to create a VPN (Virtual Private Network) from linux to linux. Normally both are gateways of a LAN, then the LANs behind them may access each other over an encrypted tunnel created by the software.
|
|
pyCA |
http://www.pyca.de/ |
1754x |
pyCA tries to make it easier for people to set up and run a organizational certificate authority which fulfills the need for a fairly secure certification processing.
|
|